Finding an accuracy on legitimacy & reputation value based malicious node detection & removal scheme on cluster in MANETs
-
https://doi.org/10.14419/ijet.v7i3.29.19292 -
Use about five key words or phrases in alphabetical order, Separated by Semicolon. -
Abstract
While Nodes forms networks dynamically & they doesn’t have any central control infrastructure in mobile ad hoc networks thus routing becomes a significant issue. As packet forwarding is done by nodes itself there is increased possibility of packet dropping or DOS (denial of service) .so, the security in wireless networks became a challenging issue in MANET. For getting secure delivery of data we require efficient routing scheme, here is the proposal “Finding an Accuracy on Legitimacy & Reputation value Based Malicious Node Detection & Removal Scheme on Cluster in MANETs†for detecting and removal of malicious nodes in a cluster. In this paper for a structured MANET, Network has number of clusters with number of nodes, each cluster has a cluster Head(CH), as packet forwarding done by nodes they need a node ID (including CH needs node ID) which is a prime number. Here to identify and use secure route between a source and a destination, every node need to maintain legitimacy value table(LVT) and reputation level table(RLT) in the network. The cluster head node Deny or Entail the malicious nodes from the identified route and select the most optimized route to a determined destination based on legitimacy value LV & reputation value RV.
As proposed in existing system the reputation values calculation is not producing good accuracy and if we use the same calculation the efficiency will affect. So, we proposed the alternative solution for this and we identified new attack and here we are providing solution for this attack by finding accurate reputation value of Malicious Node (MN) by comparing in Reputation Level Table (RLT).
Â
Â
-
References
[1] Saurabh Sharma and Dr.Sapna Gambhir,†CRCMD&R: Cluster and Reputation based Cooperative Malicious Node Detection & Removal Scheme in MANETsâ€, 11 th International Conference on Intelligent Systems and Control (ISCO) in 2017.
[2] Diaa Eldein Mustafa Ahmed, Othman O. Khalifa,â€An Overview of MANETs: Applications, Characteristics, Challenges and Recent Issuesâ€, International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-6 Issue-4, April 2017.
[3] Saurabh Sharma,†An ssecure reputation based architecture for MANET Routing†4th International conference on electronic and communication systems 2017.
[4] Saurabh Gupta, Subrat Kar, S Dharma raja, "BAAP: Black hole Attack Avoidance Protocol for Wireless Network," in Proc. iCCCT'j j, 2011, p.468-473.
[5] Rutvij H. Ihaveri, Sankita J. Patel and Devesh C. linwala, "A Novel Approach for GrayHole and BlackHole Attacks in Mobile Ad hoc Networks," in Proc. ACCT '12, 2012, p. 556-560.
[6] Saurabh Gupta, Subrat Kar, S Dharmaraja, "WHOP: Wormhole Attack Detection Protocol using Hound Packet," in Proc. JJT'll, 2011, p. 226231.
[7] Yih ChunHu, Adrian Perrig, David B. Johnson, "Rushing Attacks and Defense in Wireless Ad hoc Network Routing Protocols," in Proc. WiSe '03, 2003, p. 30-40.
-
Downloads
-
How to Cite
Sameera, D., & C. Gayathri, V. (2018). Finding an accuracy on legitimacy & reputation value based malicious node detection & removal scheme on cluster in MANETs. International Journal of Engineering & Technology, 7(3.29), 470-473. https://doi.org/10.14419/ijet.v7i3.29.19292Received date: 2018-09-09
Accepted date: 2018-09-09